{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:33Z","timestamp":1750307553249,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T00:00:00Z","timestamp":1259020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,24]]},"DOI":"10.1145\/1655925.1655972","type":"proceedings-article","created":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T15:21:10Z","timestamp":1259076070000},"page":"265-269","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["A directed signature scheme and its application to group key initial distribution"],"prefix":"10.1145","author":[{"given":"Qian","family":"Wei","sequence":"first","affiliation":[{"name":"Beijing University of Technology, Beijing, China"}]},{"given":"Jingsha","family":"He","sequence":"additional","affiliation":[{"name":"Beijing University of Technology, Beijing, China"}]},{"given":"Huiying","family":"Shao","sequence":"additional","affiliation":[{"name":"Xingtai Polytechnic College, Xingtai, China"}]}],"member":"320","published-online":{"date-parts":[[2009,11,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"1976 New directions in Cryptography","author":"Diffie W.","year":"1976","unstructured":"Diffie , W. and Hellman , M . 1976 New directions in Cryptography . IEEE Transactions on Information Theory. IT- 22, 6( Nov. 1976 ), 644--654. Diffie, W. and Hellman, M. 1976 New directions in Cryptography. IEEE Transactions on Information Theory. IT-22, 6(Nov. 1976), 644--654."},{"volume-title":"1999 The Elliptic Curve Digital Signature Algorithm (ECDSA)","author":"Johnson D.","key":"e_1_3_2_1_3_1","unstructured":"Johnson , D. , Menezes , A. , and Vanstone , S . 1999 The Elliptic Curve Digital Signature Algorithm (ECDSA) . University of Waterloo . Technical Report. CORR-99-34. Johnson, D., Menezes, A., and Vanstone, S. 1999 The Elliptic Curve Digital Signature Algorithm (ECDSA). University of Waterloo. Technical Report. CORR-99-34."},{"key":"e_1_3_2_1_4_1","volume-title":"1987 Elliptic curve cryptosystems. Mathematics of Computation. 48(Jan","author":"Koblitz N.","year":"1987","unstructured":"Koblitz , N. 1987 Elliptic curve cryptosystems. Mathematics of Computation. 48(Jan . 1987 ), 203--209. Koblitz, N. 1987 Elliptic curve cryptosystems. Mathematics of Computation. 48(Jan. 1987), 203--209."},{"key":"e_1_3_2_1_5_1","series-title":"Lecture Notes in Computer Science","volume-title":"1986 Use of elliptic curves in cryptography. Advances in Cryptology-Crypto'85","author":"Miller V. S.","year":"1986","unstructured":"Miller , V. S. 1986 Use of elliptic curves in cryptography. Advances in Cryptology-Crypto'85 . Lecture Notes in Computer Science . Springer-Verlag . 218( June 1986 ), 417--426. Miller, V. S. 1986 Use of elliptic curves in cryptography. Advances in Cryptology-Crypto'85. Lecture Notes in Computer Science. Springer-Verlag. 218(June 1986), 417--426."},{"key":"e_1_3_2_1_6_1","volume-title":"1985 A public key cryptosystem and a signature scheme based on discrete logarithms","author":"ElGamal T.","year":"1985","unstructured":"ElGamal , T. 1985 A public key cryptosystem and a signature scheme based on discrete logarithms . IEEE Transactions on Information Theory. IT- 31, 4( July 1985 ), 469--472. ElGamal, T. 1985 A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory. IT-31, 4(July 1985), 469--472."},{"key":"e_1_3_2_1_7_1","first-page":"308","article-title":"Modified Maurer-Yacobi's scheme and its applications. Advances in Cryptology-Auscrypt'92. Lecture Notes in Computer Science","volume":"718","author":"Lim C. H.","year":"1993","unstructured":"Lim , C. H. and Lee , P. J. 1993 Modified Maurer-Yacobi's scheme and its applications. Advances in Cryptology-Auscrypt'92. Lecture Notes in Computer Science . Springer-Verlag. 718 , 308 -- 323 . DOI=10.1007\/3-540-57220-1. Lim, C. H. and Lee, P. J. 1993 Modified Maurer-Yacobi's scheme and its applications. Advances in Cryptology-Auscrypt'92. Lecture Notes in Computer Science. Springer-Verlag. 718, 308--323. DOI=10.1007\/3-540-57220-1.","journal-title":"Springer-Verlag."},{"key":"e_1_3_2_1_8_1","series-title":"Lecture Notes in Computer Science","volume-title":"1997 Directed signatures and application to threshold cryptosystems. Advances in Cryptology-Crypt'97","author":"Lim C. H.","unstructured":"Lim , C. H. and Lee , P. J . 1997 Directed signatures and application to threshold cryptosystems. Advances in Cryptology-Crypt'97 . Lecture Notes in Computer Science . Springer-Verlag . 1189, 131--138. DOI=10.1007\/3-540-62494-5. Lim, C. H. and Lee, P. J. 1997 Directed signatures and application to threshold cryptosystems. Advances in Cryptology-Crypt'97. Lecture Notes in Computer Science. Springer-Verlag. 1189, 131--138. DOI=10.1007\/3-540-62494-5."},{"key":"e_1_3_2_1_9_1","unstructured":"Lal S. and Kumar M. 2004 A directed signature scheme and its applications. Computer Science - Cryptography and Security. Available at http:\/\/arxiv.org\/abs\/cs\/0409036.  Lal S. and Kumar M. 2004 A directed signature scheme and its applications. Computer Science - Cryptography and Security. Available at http:\/\/arxiv.org\/abs\/cs\/0409036."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511546570","volume-title":"2005 Advances in Elliptic Curve Cryptography","author":"Blake I. F.","year":"2005","unstructured":"Blake , I. F. , Seroussi , G. , and Smart , N. P . 2005 Advances in Elliptic Curve Cryptography . Cambridge University Press . Apr. 2005 , 15--20. Blake, I. F., Seroussi, G., and Smart, N. P. 2005 Advances in Elliptic Curve Cryptography. Cambridge University Press. Apr. 2005, 15--20."}],"event":{"name":"ICIS '09: The 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","sponsor":["AICIT","ETRI","KISTI"],"location":"Seoul Korea","acronym":"ICIS '09"},"container-title":["Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1655972","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1655925.1655972","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:41Z","timestamp":1750249421000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1655972"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,24]]},"references-count":9,"alternative-id":["10.1145\/1655925.1655972","10.1145\/1655925"],"URL":"https:\/\/doi.org\/10.1145\/1655925.1655972","relation":{},"subject":[],"published":{"date-parts":[[2009,11,24]]},"assertion":[{"value":"2009-11-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}